A Secure and Efficient Three-Pass Authenticated Key Agreement Protocol Based on Elliptic Curves (original) (raw)

An Efficient and Secure Three-Pass Authenticated Key. Agreement Elliptic Curve Based Protocol

Yaw-Chung Chen

International journal of innovative computing, information & control: IJICIC

View PDFchevron_right

An Efficient Key Agreement Protocol for Secure Authentication

Eui-nam Huh

Lecture Notes in Computer Science, 2004

View PDFchevron_right

A new two-pass key agreement protocol

Magdy Saeb

… and Human Science, …, 2003

View PDFchevron_right

Tree and elliptic curve based efficient and secure group key agreement protocol

Arjun singh Rawat

Journal of Information Security and Applications, 2020

View PDFchevron_right

A New Security Model for Authenticated Key Agreement

Philippe Elbaz-vincent

Security and Cryptography for Networks, 2010

View PDFchevron_right

Vulnerability of two multiple-key agreement protocols

mohammad sabzinejad Farash

View PDFchevron_right

A New Efficient Protocol for Authenticated Key Agreement

fatma ahmed

International Journal of Computer and Communication Engineering, 2013

View PDFchevron_right

Cryptanalysis of an efficient three‐party password‐based key exchange scheme

Marcos Simplício

2012

View PDFchevron_right

Secret Sharing-based Authenticated Key Agreement Protocol

Petr Cika

The 16th International Conference on Availability, Reliability and Security, 2021

View PDFchevron_right

A New Secure Protocol for Authenticated Key Agreement

fatma ahmed

International Journal of Engineering and Technology, 2013

View PDFchevron_right

On the security of an efficient two-pass key agreement protocol

Yuh-Min Tseng

Computer Standards & Interfaces, 2004

View PDFchevron_right

A weakness in Sun-Chen-Hwang’s three-party key agreement protocols using passwords⋆

Seungjoo Kim

2004

View PDFchevron_right

A Fast and Secure Elliptic Curve Based Authenticated Key Agreement Protocol For Low Power Mobile Communications

bachar elhassan

The 2007 International Conference on Next Generation Mobile Applications, Services and Technologies (NGMAST 2007), 2007

View PDFchevron_right

On the security of a password-only authenticated three-party key exchange protocol

Juryon Paik

View PDFchevron_right

An efficient elliptic curve cryptography based authenticated key agreement protocol for wireless LAN security

Mohammad Azim

HPSR. 2005 Workshop on High Performance Switching and Routing, 2005., 2000

View PDFchevron_right

A secure and robust elliptic curve cryptography‐based mutual authentication scheme for session initiation protocol

mahdi nikooghadam

SECURITY AND PRIVACY, 2019

View PDFchevron_right

Improvement of modified authenticated key agreement protocol

Chris Mitchell

Applied Mathematics and Computation, 2003

View PDFchevron_right

On the security of a simple three-party key exchange protocol without server's public keys

Minkyu Park

TheScientificWorldJournal, 2014

View PDFchevron_right

Efficient provably secure password-based explicit authenticated key agreement

Neeraj Kumar

Pervasive and Mobile Computing, 2015

View PDFchevron_right

An ID-based authenticated three-party key exchange protocol

Susmita Mandal

ACCENTS Transactions on Information Security, 2017

View PDFchevron_right

Cryptanalysis and improvement of ‘an improved authentication with key agreement scheme on elliptic curve cryptosystem for global mobility networks’

mohammad sabzinejad Farash

International Journal of Network Management, 2014

View PDFchevron_right

Elliptic Curve based Authenticated Session Key Establishment Protocol for High Security Applications in Constrained Network Environment

Chandrasekhara Pillai P K

International Journal of Network Security and …, 2010

View PDFchevron_right

Authenticated Key Agreement Protocols: A Comparative Study

Scientific Research Publishing

View PDFchevron_right

Cryptanalysis of simple three-party key exchange protocol

Y. Mu

Computers & Security, 2008

View PDFchevron_right

An efficient certificateless two-party authenticated key agreement protocol

Sahadeo Padhye

Computers & Mathematics with Applications, 2012

View PDFchevron_right

Implementing Authentication Protocol for Exchanging Encrypted Messages via an Authentication Server based on Elliptic Curve Cryptography with the El …

Konstantinos Chalkias

V International Enformatika …, 2005

View PDFchevron_right

Cryptanalysis of a Three-party Password-based Authenticated Key Exchange Protocol

Ashwin Chandrasekar

View PDFchevron_right

Pretty-simple password-authenticated key-exchange protocol proven to be secure in the standard model

Hideki Imai

IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences

View PDFchevron_right

An Efficient Pairing-Free Certificateless Authenticated Two-Party Key Agreement Protocol Over Elliptic Curves

gowri thumbur

Advances in Intelligent Systems and Computing, 2015

View PDFchevron_right

An Enhanced and Secure Three-Party Password-based Authenticated Key Exchange Protocol without Using Server’s Public-Keys and Symmetric Cryptosystems

mohammad sabzinejad Farash

View PDFchevron_right

Implementing Network Security Protocols based on Elliptic Curve Cryptography

Murat Aydos

1999

View PDFchevron_right